Browsing Institutt for datateknologi og informatikk by Title
Now showing items 2282-2301 of 6560
-
Evaluating Artificial Neural Network Robustness for Safety-Critical Systems
(Doctoral theses at NTNU;2023:364, Doctoral thesis, 2023)With the power to perform more complex tasks than humans, artificial neural networks (ANNs) have been applied to execute tasks in safety-critical systems (SCSs), such as object detection, image recognition, and navigation. ... -
Evaluating clinical diversity and plausibility of synthetic capsule endoscopic images
(Peer reviewed; Journal article, 2023)Wireless Capsule Endoscopy (WCE) is being increasingly used as an alternative imaging modality for complete and non-invasive screening of the gastrointestinal tract. Although this is advantageous in reducing unnecessary ... -
Evaluating Code Overlays on the Oberon System Using RISC-V
(Master thesis, 2021)Code overlays er en teknikk for å redusere minnet brukt av programkode ved å laste deler av programmet fra sekundærminnet til primærminnet etter behov. Til tross for å være en gammel teknikk har det nylig vekt interesse ... -
Evaluating color vision deficiency daltonization methods using a behavioral visual-search method
(Journal article; Peer reviewed, 2016)Daltonization methods are used to automatically improve color images for color-deficient people. A comparison of different daltonization methods, however, is still left undone. We propose a visual-search method to evaluate ... -
Evaluating digital creativity support for children: A systematic literature review
(Peer reviewed; Journal article, 2023)Creativity, the process of creating something new and valuable, benefits children by improving their skills and development, encouraging interaction and engagement, and enabling the generation and expression of novel ideas. ... -
Evaluating established B⁺-tree access methods in a parallel processing environment
(Master thesis, 2022)For å kunne fortsette å oppnå stadig større ytelse og gjennomstrømning, benytter datamaskiner i dag et økende antall prosesseringsenheter. Den moderne maskinvarearkitekturen krever horisontal skalerbarhet av applikasjoner ... -
Evaluating Evolution Strategies as a Method to Combat Adversarial Attacks on Convolutional Neural Networks
(Bachelor thesis, 2022)De siste årene har dype nevrale nettverk blitt brukt til bildeklassifisering, og de har oppnådd imponerende resultater. Desverre er nevrale nettverk sårbare for angrep, der små endringer legges til bildene. Denne artikkelen ... -
Evaluating FIFO-based Instruction Scheduling Techniques using FPGAs
(Master thesis, 2020)The performance advantage of out-of-order processors stems from their ability to extract more instruction-level parallelism (ILP) and memory-level parallelism (MLP) than in-order cores. This is largely the benefit of the ... -
Evaluating FoundationDB as a replacement for MongoDB
(Master thesis, 2019)Er det mulig å erstatte flere databasetyper med én enkelt database? FoundationDB, som nylig ble sluppet som åpen kildekode, lover å tilby akkurat dette, uten å måtte ofre integritet eller ytelse. Den påstår å kunne levere ... -
Evaluating Histograms for Selectivity Estimations
(Master thesis, 2015)Histograms have a long history in the field of statistics, and have been used in the past few decades to capture the distribution of data in database management systems. In a database system, they can give the query optimizer ... -
Evaluating learners’ emotional states by monitoring brain waves for comparing game-based learning approach to pen-and-paper
(Chapter, 2019)A new interest in the use of game factors while acquiring new knowledge has emerged, and a number of researchers are investigating the effectiveness of the game-based approach in education systems. Recent research in ... -
Evaluating Machine Learning Methods for City Bike Demand Prediction in Oslo
(Master thesis, 2018)A bike-sharing system is a service in which a fleet of bicycles is made available to the public on a short-term basis through self-served docking stations. These stations are limited in capacity and are often depleted or ... -
Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network
(Journal article; Peer reviewed, 2019)Payment channels and off-chain transactions are used to address blockchain scalability. Those mechanisms rely on the blockchain proper, as the resolution mechanism. They allow for high transaction throughput due to the ... -
Evaluating Object (Mis)Detection From a Safety and Reliability Perspective: Discussion and Measures
(Peer reviewed; Journal article, 2023)We argue that object detectors in the safety critical domain should prioritize detection of objects that are most likely to interfere with the actions of the autonomous actor. Especially, this applies to objects that can ... -
Evaluating performance and scalability of unified model for NWP
(Master thesis, 2005) -
Evaluating performance impact of performing computations on storage nodes - Batch on Eos Extra Resources (BEER)
(Master thesis, 2018)The Batch on EOS Extra Resources (BEER) project is a response to observations of available computing resources on EOS storage system. BEER introduces sharing computing resources between storage and compute nodes. The project ... -
Evaluating Polarity Trend Amidst the Coronavirus Crisis in Peoples’ Attitudes toward the Vaccination Drive
(Peer reviewed; Journal article, 2021)t has been more than a year since the coronavirus (COVID-19) engulfed the whole world, disturbing the daily routine, bringing down the economies, and killing two million people across the globe at the time of writing. The ... -
Evaluating Publish/Subscribe Protocols for use in Constrained Networks
(Master thesis, 2022)I dag eksisterer det mange enheter og sensorer som produserer store mengder data som må behandles for å hente ut nyttig informasjon. Antallet enheter vokser etterhvert som ny teknologi raskt utvikles, som igjen produserer ... -
Evaluating Security in Open Source Consumer Applications
(Master thesis, 2007)Introduction The aim of this Master Thesis is to develop a software security guideline that will be used for evaluating methods and measuring security in open source projects with a high security implication such as ...